Sciweavers

23988 search results - page 190 / 4798
» Social Network Computing
Sort
View
128
Voted
ICWSM
2010
15 years 5 months ago
Who Acquires Friends Through Social Media and Why? "Rich Get Richer" Versus "Seek and Ye Shall Find"
There is an ongoing debate, not just among academics but in popular culture, about whether social media can expand people's social networks, and whether online friends can be...
Zeynep Tufekci
125
Voted
KDD
2008
ACM
142views Data Mining» more  KDD 2008»
16 years 4 months ago
Weighted graphs and disconnected components: patterns and a generator
The vast majority of earlier work has focused on graphs which are both connected (typically by ignoring all but the giant connected component), and unweighted. Here we study numer...
Mary McGlohon, Leman Akoglu, Christos Faloutsos
134
Voted
ACHI
2009
IEEE
15 years 8 months ago
Understanding Social Robots
Research on social robots is mainly comprised of research into algorithmic problems in order to expand a robot´s capabilities to improve communication with human beings. Also, a ...
Frank Hegel, Claudia Muhl, Britta Wrede, Martina H...
ICDCS
2008
IEEE
15 years 10 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
CIKM
2009
Springer
15 years 10 months ago
On optimising personal network size to manage information flow
PN refer to the set of ties a specific individual has with other people. There is significant variation in the size of an individual’s PN and this paper explores the effect o...
Yu-En Lu, Sam Roberts, Tammy M. K. Cheng, Robin Du...